Chapter 3 Answers To Review Questions and Exercises
Chapter 3 Answers To Review Questions and Exercises
[A HD]Exercises
1. What does CISSP stand for? Use the Internet to identify the ethical rules CISSP
holders have agreed to follow.
CISSP stands for Certified Information Systems Security Professional. The
requirements for CISSP certification are as follows:
Subscribe to ISC2’s Code of Ethics.
Have at least three years of direct, full-time security professional work
experience in one or more of the 10 test domains of the information systems
security Common Body of Knowledge (CBK). Valid experience includes
information systems security-related work performed as a practitioner, auditor,
consultant, vendor, investigator, or instructor, or work that requires IS security
knowledge and involves direct application of that knowledge.
No affiliation with any organization is required for taking the CISSP
certification examination.
Once these requirements have been met, one may take the certification test. The
CISSP certification examination consists of 250 multiple-choice questions.
Candidates have up to six hours to complete the examination, which covers the 10
test domains of the information systems security Common Body of Knowledge:
Access control systems & methodology
Applications & systems development
Business continuity planning
Cryptography
Law, investigation, & ethics
Operations security
Physical security
Security architecture & models
Security management practices
Telecommunications, network, & Internet security
After the exam, the following maintenance is required:
After passing your CISSP certification examination, you will receive a
certificate and ID card. You are also eligible to be listed in the CISSP
Directory, to participate in the Speakers’ Bureau, and to serve on ISC2
committees and participate in annual elections.
CISSP recertification is required every three years, with ongoing requirements
for maintaining credentials in good standing. Recertification is accomplished
mainly through continuing professional education (CPE) and by earning 120
CPE credits every three years.
ISC2 also charges an annual maintenance fee.
2. For what kind of information security jobs does the NSA recruit? Use the Internet
to visit its Web page and find out.
Information assurance research with these skills:
o Secure network technology
Biometrics
Intrusion detection
Wireless security
High-speed networking security
o Secure systems research
o Secure network technology
o Cryptology research
Information Assurance Directorate with these skills:
o Network security
o Vulnerability analysis
o Public key infrastructure (PKI)
o Security testing/red teaming
o Firewalls/router security
o Security software design/development (object-oriented programming:
C++/Java)
o Firewalls/router security
o Security hardware design/development
o Customer support
o Defense information operations (DIO)
o Special Processing Laboratory (SPL, now part of IAD)
o Microelectronics Research Laboratory (MRL, now part of IAD)
Networking with these skills:
o Packet based
o Internet/intranets
o Protocol development
o Optical network management
o Advanced research
Alternate answer
The NSA’s ongoing mission involves monitoring, gathering, and decoding foreign
communication signals from around the world, as well as information assurance.
To meet this goal, the NSA actively recruits people with computer and
engineering backgrounds as well as people who are conversant in foreign
languages. Current job titles listed at the NSA’s Web site include Inspector
General Auditor/IT Specialist, Mathematician, Computer Scientist, Cryptanalyst,
Electronic and Computer Engineer, Signals Analyst, Signals Intelligence
(SIGINT) Systems Engineering Architect, and Linguist.
3. Using the resources in your library, find out what laws your state has passed to
prosecute computer crime.
(Each state will have different answers. Answers from the state of Georgia are
given as a representative example.)
The Georgia Computer Systems Protection Act was signed into law in 1991. It
repealed and replaced an act of the same name 10 years earlier. The law
establishes certain acts of computer fraud or abuse as crimes punishable by fines,
imprisonment, or both. A modification to the law was passed by the 1996 session
of the Georgia General Assembly.
The following computer crimes are defined by state law (Georgia Code 16-9-90 et
seq.):
Computer theft—Includes theft of computer services, intellectual property such
as copyrighted material, and any other property.
Computer trespass—Unauthorized use of computers to delete or alter data or
interfere with others’ usage.
Computer invasion of privacy—Unauthorized access to financial or personal
data.
Computer forgery—Forgery as defined by other laws, but committed on a
computer rather than on paper.
Computer password disclosure—Unauthorized disclosure of a password
resulting in damages of more than $500. In practice, this includes any disclosure
that requires a system security audit afterward.
Maximum penalties are a $5,000 fine and one year of imprisonment for password
disclosure, and a $50,000 fine and 15 years of imprisonment for the other
computer crimes, plus civil liability. The law also includes the following state
codes:
Code 16-9-91 contains the Georgia Assembly’s findings that previous
laws made it difficult to prosecute computer crimes.
Code 16-9-92 includes definitions of computer, computer network,
computer operation, computer program, data, financial instruments,
property, services, use, victim expenditure, and without authority.
Code 16-9-93 goes into detail about computer theft, computer trespass,
computer invasion of privacy, computer forgery, computer password
disclosure, articles of exclusion, civil relief damages, and criminal
penalties.